In order to avoid the complexity of Gaussian modulation and the problem that the traditional point-to-point communication DM-CVQKD protocol cannot meet the demand for multi-user key sharing at the same time, we propos...In order to avoid the complexity of Gaussian modulation and the problem that the traditional point-to-point communication DM-CVQKD protocol cannot meet the demand for multi-user key sharing at the same time, we propose a multi-ring discrete modulation continuous variable quantum key sharing scheme(MR-DM-CVQSS). In this paper, we primarily compare single-ring and multi-ring M-symbol amplitude and phase-shift keying modulations. We analyze their asymptotic key rates against collective attacks and consider the security key rates under finite-size effects. Leveraging the characteristics of discrete modulation, we improve the quantum secret sharing scheme. Non-dealer participants only require simple phase shifters to complete quantum secret sharing. We also provide the general design of the MR-DM-CVQSS protocol.We conduct a comprehensive analysis of the improved protocol's performance, confirming that the enhancement through multi-ring M-PSK allows for longer-distance quantum key distribution. Additionally, it reduces the deployment complexity of the system, thereby increasing the practical value.展开更多
Measurement-based quantum computation with continuous variables,which realizes computation by performing measurement and feedforward of measurement results on a large scale Gaussian cluster state,provides a feasible w...Measurement-based quantum computation with continuous variables,which realizes computation by performing measurement and feedforward of measurement results on a large scale Gaussian cluster state,provides a feasible way to implement quantum computation.Quantum error correction is an essential procedure to protect quantum information in quantum computation and quantum communication.In this review,we briefly introduce the progress of measurement-based quantum computation and quantum error correction with continuous variables based on Gaussian cluster states.We also discuss the challenges in the fault-tolerant measurement-based quantum computation with continuous variables.展开更多
In order to study the influence of die combination on continuous variable cross-section direct extrusion (CVCDE) in the extrusion process, the accumulative strain formula is derived, and it can be known that the ext...In order to study the influence of die combination on continuous variable cross-section direct extrusion (CVCDE) in the extrusion process, the accumulative strain formula is derived, and it can be known that the extrusion ratio of various stages directly determines the size of corresponding stage strain by formula. In this paper, as an example of the two interim dies, three die combinations of different angles and extrusion ratio are designed. Aviation magnesium alloy ZM6 is studied, and the results show that dynamic recrystallization is even more complete when continuous shear deformation occurs, so that the refinement and homogenization of microstructure are obtained. By the use of different die combinations, the accumulative strain increases under the conditions of same total extrusion ratio. Thus, the refined crystalline strengthening effect of extrusion deformation can be further analyzed. Due to the dead-zone defects, the actual accumulative strain decreases significantly and the effect of microstructure and performance improvements also decreases with it. Therefore, the optimal design of die combination is the key to the process and product of CVCDE, which provides a scientific basis for the development of severe plastic deformation.展开更多
Quantum key distribution enables unconditionally secure key distribution between two legitimate users.The information-theoretic security is guaranteed by the fundamental laws of quantum physics.Initially,the quantum k...Quantum key distribution enables unconditionally secure key distribution between two legitimate users.The information-theoretic security is guaranteed by the fundamental laws of quantum physics.Initially,the quantum key distribution protocol was proposed based on the qubits.Later on,it was found that quantum continuous variables can also be exploited for this target.The continuous variable quantum key distribution can build upon standard telecommunication technology and exhibits a higher secret key rate per pulse at a relatively short distance due to the possibility of encoding more than 1 bit per pulse.In this article,we review the current status of the continuous variable quantum key distribution research,including its basic principle,experimental implementations,security and future directions;the experimental progress in this field made by our group is also presented.展开更多
A symmetric two-mode Gaussian entangled state is used to investigate the effect of excess noise on entanglement sudden death and Gaussian quantum discord with continuous variables. The results show that the excess noi...A symmetric two-mode Gaussian entangled state is used to investigate the effect of excess noise on entanglement sudden death and Gaussian quantum discord with continuous variables. The results show that the excess noise in the channel can lead to entanglement sudden death of a symmetric two-mode Gaussian entangled state, while Gaussian quantum discord never vanishes. As a practical application, the security of a quantum key distribution (QKD) scheme based on a symmetric two-mode Gaussian entangled state against collective Gaussian attacks is analyzed. The calculation results show that the secret key cannot be distilled when entanglement vanishes and only quantum discord exists in such a QKD scheme.展开更多
In this paper, a protocol for quantum millionaire problem with continuous variables is proposed. In the protocol, two participants can compare the values of their fortune with the assistance of a semi-trusted third pa...In this paper, a protocol for quantum millionaire problem with continuous variables is proposed. In the protocol, two participants can compare the values of their fortune with the assistance of a semi-trusted third party(STTP). Only EPR states are exploited in our protocol while most other protocols exploited d-dimensional Bell states.Two participants are just required to perform single particle operations, which makes our protocol more efficiently. Our protocol can ensure fairness, correctness, security and high efficiency as well. In our protocol, only the two participants can deduce the results of comparisons, others include STTP will learn no information. Our protocol can resist various kinds of attacks from both the outside eavesdroppers and the inside participants, even the STTP.展开更多
Atmospheric effects have significant influence on the performance of a free-space optical continuous variable quantum key distribution(CVQKD)system.In this paper,we investigate how the transmittance,excess noise and i...Atmospheric effects have significant influence on the performance of a free-space optical continuous variable quantum key distribution(CVQKD)system.In this paper,we investigate how the transmittance,excess noise and interruption probability caused by atmospheric effects affect the secret-key rate(SKR)of the CVQKD.Three signal wavelengths,two weather conditions,two detection schemes,and two types of attacks are considered in our investigation.An expression aims at calculating the interruption probability is proposed based on the Kolmogorov spectrum model.The results show that a signal using long working wavelength can propagate much further than that of using short wavelength.Moreover,as the wavelength increases,the influence of interruption probability on the SKR becomes more significant,especially within a certain transmission distance.Therefore,interruption probability must be considered for CVQKD by using long-signal wavelengths.Furthermore,different detection schemes used by the receiver will result in different transmission distances when subjected to individual attacks and collective attacks,respectively.展开更多
We mostly investigate two schemes. One is to teleport a multi-mode W-type entangled coherent state using a peculiar bipartite entangled state as the quantum channel different from other proposals. Based on our formali...We mostly investigate two schemes. One is to teleport a multi-mode W-type entangled coherent state using a peculiar bipartite entangled state as the quantum channel different from other proposals. Based on our formalism,teleporting multi-mode coherent state or squeezed state is also possible. Another is that the tripartite entangled state is used as the quantum channel of controlled teleportation of an arbitrary and unknown continuous variable in the case of three participators.展开更多
A quantum teleportation scheme to teleport a kind of tripartite entangled states of continuous variables by using a quantum channel composed of three bipartite entangled states is proposed. The joint Bell measurement ...A quantum teleportation scheme to teleport a kind of tripartite entangled states of continuous variables by using a quantum channel composed of three bipartite entangled states is proposed. The joint Bell measurement is feasible because the bipartite entangled states are complete and the squeezed state has a natural representation in the entangled state basis. The calculation is greatly simplified by using the Schmidt decomposition of the entangled states.展开更多
Measurement-based one-way quantum computation, which uses cluster states as resources, provides an efficient model to perforrn computation. However, few of the continuous variable (CV) quantum algorithms and classic...Measurement-based one-way quantum computation, which uses cluster states as resources, provides an efficient model to perforrn computation. However, few of the continuous variable (CV) quantum algorithms and classical algorithms based on one-way quantum computation were proposed. In this work, we propose a method to implement the classical Hadamard transform algorithm utilizing the CV cluster state. Compared with classical computation, only half operations are required when it is operated in the one-way CV quantum computer. As an example, we present a concrete scheme of four-mode classical Hadamard transform algorithm with a four-partite CV cluster state. This method connects the quantum computer and the classical algorithms, which shows the feasibility of running classical algorithms in a quantum computer efficiently.展开更多
Magnesium(Mg) alloy AZ31 was produced by continuous variable cross-section direct extrusion(CVCDE)to study its deformation behavior. Metallographic microscopy(OM), transmission electron microscopy(TEM), and sc...Magnesium(Mg) alloy AZ31 was produced by continuous variable cross-section direct extrusion(CVCDE)to study its deformation behavior. Metallographic microscopy(OM), transmission electron microscopy(TEM), and scanning electron microscopy(SEM) were used to observe the variations in microstructure and fracture morphology of Mg alloy AZ31 as a function of processing methods. The results reveal that grains of Mg alloy AZ31 were refined and their microstructure was homogenized by CVCDE. The recrystallization in Mg alloy AZ31 produced by CVCDE with 2 interim dies was more complete than that produced by conventional extrusion(CE) and CVCDE with 1 interim die, and the grains were finer and more uniform.Plasticity of the AZ31 alloy was improved. Fracture mode was evolved from a combination of ductility and brittleness to a sole ductile form. In summary, a CVCDE mold structure with 2 interim dies can improve microstructure, plasticity, and toughness of Mg alloy AZ31.展开更多
We propose a deterministic quantum secure direct two check photon sequences are used to check the securities of the communication protocol by using dense coding. The channels between the message sender and the receive...We propose a deterministic quantum secure direct two check photon sequences are used to check the securities of the communication protocol by using dense coding. The channels between the message sender and the receiver. The continuous variable operations instead of the usual discrete unitary operations are performed on the travel photons so that the security of the present protocol can be enhanced. Therefore some specific attacks such as denial-of-service attack, intercept-measure-resend attack and invisible photon attack can be prevented in ideal quantum channel. In addition, the scheme is still secure in noise channel. Furthurmore, this protocol has the advantage of high capacity and can be realized in the experiment.展开更多
We propose a scheme for controlled entanglement swapping of continuous variable, where an EPR pair shared by two parties (Alice and Debbie) and a GHZ entangled state shared by three parties (Alice, Bob and Claire)...We propose a scheme for controlled entanglement swapping of continuous variable, where an EPR pair shared by two parties (Alice and Debbie) and a GHZ entangled state shared by three parties (Alice, Bob and Claire) are required. One optical beams of the EPR state will be entangled with the output mode displaced by Bob with the help of Claire. It is shown that the entanglement swapping can occur controlled by the third party (Claire)展开更多
We investigate continuous variable entanglement produced in two distant coupled cavities, in which two four-level atoms are driven by classical fields respectively. Under the large detuning condition, an effective Ham...We investigate continuous variable entanglement produced in two distant coupled cavities, in which two four-level atoms are driven by classical fields respectively. Under the large detuning condition, an effective Hamiltonian containing the square of the creation (annihilation) operator of the cavity field is derived. Due to the nonlinearity, entanglement formally created by the beam splitter type interaction is transformed into the nondegenerate parametric down conversion type. Employing the operator algebraic method, we study the time evolution of the entanglement condition, and show that the system provides us an advantage in achieving a larger photon number with better entanglement. We also discuss the dissipation of the cavities affecting the entanglement.展开更多
We study entanglement swapping in continuous variable systems by using braiding transformations.It isfound that entanglement swapping in two-mode squeezed vacuum states and squeezed coherent states can be realizedbase...We study entanglement swapping in continuous variable systems by using braiding transformations.It isfound that entanglement swapping in two-mode squeezed vacuum states and squeezed coherent states can be realizedbased on the braiding operators.展开更多
We present a realistic scheme for the entanglement swapping of continuous variable, in which a two-mode squeezed vacuum state serves as a quantum channel. The position sum and momentum difference of two local modes ar...We present a realistic scheme for the entanglement swapping of continuous variable, in which a two-mode squeezed vacuum state serves as a quantum channel. The position sum and momentum difference of two local modes are measured. By taking the input entangled state also as a two-mode squeezed vacuum state, we investigate the average fidelity and the yon Neumann entropy of the output state. The results show that the perfect teleportation can be achieved by increasing the squeezing of the quantum channel and that any nonzero squeezing in both the quantum channel and the input entangled state is sufficient to swap the entanglement.展开更多
Quantum entanglement is a typical nonclassical correlation.Here,we use this concept to analyze quantum entanglement for continuous variables generated by the Schwinger pair production for constant and pulsed electric ...Quantum entanglement is a typical nonclassical correlation.Here,we use this concept to analyze quantum entanglement for continuous variables generated by the Schwinger pair production for constant and pulsed electric fields.An initial two-mode entangled state evolves into a three-mode entangled state through a Gaussian channel of the Schwinger effect,which encodes the information about the Schwinger effect.By detecting the entanglement of the output three-mode state,we obtain the optimal parameters for easier to generate particle-antiparticle pairs.We find that the generated 1→2 entanglement is more sensitive to the parameters than the generated 1→1 entanglement.Therefore,we should choose the generated 1→2 entanglement to extract information.We argue that extracting the optimal parameters from quantum entanglement may guide future experiments.展开更多
The difficulty of quantum key agreement is to realize its security and fairness at the same time.This paper presents a new three-party quantum key agreement protocol based on continuous variable single-mode squeezed s...The difficulty of quantum key agreement is to realize its security and fairness at the same time.This paper presents a new three-party quantum key agreement protocol based on continuous variable single-mode squeezed state.The three parties participating in the agreement are peer entities,making same contributions to the final key.Any one or two participants of the agreement cannot determine the shared key separately.The security analysis shows that the proposed protocol can resist both external and internal attacks.展开更多
In this work, we examine the robust continuous variable quantum correlation by analyzing two coupled optomechanical systems. Under the linearization approximation, the steady state correlation is quantified through co...In this work, we examine the robust continuous variable quantum correlation by analyzing two coupled optomechanical systems. Under the linearization approximation, the steady state correlation is quantified through correlation function of two non-Hermitian operators and we find that quantum correlation is always existence between two optical fields, two-oscillators and optical field-oscillator. Unlike the discrete variable system, we show quantum correlation in our model seems to be independent without any close transfer relationship. We further emphasize the influence of cavity-cavity coupling parameter on the amount of quantum correlations.展开更多
This paper is concerned with the oscillation of nonlinear partial difference equations with continuous variables and the corresponding dual equations. Several sufficientconditions are obtained for the oscillation of t...This paper is concerned with the oscillation of nonlinear partial difference equations with continuous variables and the corresponding dual equations. Several sufficientconditions are obtained for the oscillation of these equations.展开更多
基金Project supported by the National Natural Science Foundation of China(Grant Nos.61971348 and 61201194)。
文摘In order to avoid the complexity of Gaussian modulation and the problem that the traditional point-to-point communication DM-CVQKD protocol cannot meet the demand for multi-user key sharing at the same time, we propose a multi-ring discrete modulation continuous variable quantum key sharing scheme(MR-DM-CVQSS). In this paper, we primarily compare single-ring and multi-ring M-symbol amplitude and phase-shift keying modulations. We analyze their asymptotic key rates against collective attacks and consider the security key rates under finite-size effects. Leveraging the characteristics of discrete modulation, we improve the quantum secret sharing scheme. Non-dealer participants only require simple phase shifters to complete quantum secret sharing. We also provide the general design of the MR-DM-CVQSS protocol.We conduct a comprehensive analysis of the improved protocol's performance, confirming that the enhancement through multi-ring M-PSK allows for longer-distance quantum key distribution. Additionally, it reduces the deployment complexity of the system, thereby increasing the practical value.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.11834010,11804001,and 11904160)the Natural Science Foundation of Anhui Province,China(Grant No.1808085QA11)+1 种基金the Program of Youth Sanjin Scholar,National Key R&D Program of China(Grant No.2016YFA0301402)the Fund for Shanxi"1331 Project"Key Subjects Construction.
文摘Measurement-based quantum computation with continuous variables,which realizes computation by performing measurement and feedforward of measurement results on a large scale Gaussian cluster state,provides a feasible way to implement quantum computation.Quantum error correction is an essential procedure to protect quantum information in quantum computation and quantum communication.In this review,we briefly introduce the progress of measurement-based quantum computation and quantum error correction with continuous variables based on Gaussian cluster states.We also discuss the challenges in the fault-tolerant measurement-based quantum computation with continuous variables.
基金financially supported by the National Natural Science Foundation of China(No.51205094)
文摘In order to study the influence of die combination on continuous variable cross-section direct extrusion (CVCDE) in the extrusion process, the accumulative strain formula is derived, and it can be known that the extrusion ratio of various stages directly determines the size of corresponding stage strain by formula. In this paper, as an example of the two interim dies, three die combinations of different angles and extrusion ratio are designed. Aviation magnesium alloy ZM6 is studied, and the results show that dynamic recrystallization is even more complete when continuous shear deformation occurs, so that the refinement and homogenization of microstructure are obtained. By the use of different die combinations, the accumulative strain increases under the conditions of same total extrusion ratio. Thus, the refined crystalline strengthening effect of extrusion deformation can be further analyzed. Due to the dead-zone defects, the actual accumulative strain decreases significantly and the effect of microstructure and performance improvements also decreases with it. Therefore, the optimal design of die combination is the key to the process and product of CVCDE, which provides a scientific basis for the development of severe plastic deformation.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.61378010 and 11504219)the Key Project of the Ministry of Science and Technology of China(Grant No.2016YFA0301403)+1 种基金the Natural Science Foundation of Shanxi Province,China(Grant No.2014011007-1)the Program for the Outstanding Innovative Teams of Higher Learning Institutions of Shanxi Province,China
文摘Quantum key distribution enables unconditionally secure key distribution between two legitimate users.The information-theoretic security is guaranteed by the fundamental laws of quantum physics.Initially,the quantum key distribution protocol was proposed based on the qubits.Later on,it was found that quantum continuous variables can also be exploited for this target.The continuous variable quantum key distribution can build upon standard telecommunication technology and exhibits a higher secret key rate per pulse at a relatively short distance due to the possibility of encoding more than 1 bit per pulse.In this article,we review the current status of the continuous variable quantum key distribution research,including its basic principle,experimental implementations,security and future directions;the experimental progress in this field made by our group is also presented.
基金supported by the National Basic Research Program of China(Grant No.2010CB923103)the National Natural Science Foundation of China(GrantNos.11174188 and 61121064)the Fund from the Shanxi Scholarship Council of China(Grant No.2012-010)
文摘A symmetric two-mode Gaussian entangled state is used to investigate the effect of excess noise on entanglement sudden death and Gaussian quantum discord with continuous variables. The results show that the excess noise in the channel can lead to entanglement sudden death of a symmetric two-mode Gaussian entangled state, while Gaussian quantum discord never vanishes. As a practical application, the security of a quantum key distribution (QKD) scheme based on a symmetric two-mode Gaussian entangled state against collective Gaussian attacks is analyzed. The calculation results show that the secret key cannot be distilled when entanglement vanishes and only quantum discord exists in such a QKD scheme.
基金Supported by the National Natural Science Foundation of China under Grant Nos.61170270,61003290,61170221,61100205the Specialized Research Fund for the Doctoral Program of Higher Education under Grant Nos.20091103120014,20090005110010+1 种基金Beijing Natural Science Foundation under Grant No.4122008the ISN open Foundation
文摘In this paper, a protocol for quantum millionaire problem with continuous variables is proposed. In the protocol, two participants can compare the values of their fortune with the assistance of a semi-trusted third party(STTP). Only EPR states are exploited in our protocol while most other protocols exploited d-dimensional Bell states.Two participants are just required to perform single particle operations, which makes our protocol more efficiently. Our protocol can ensure fairness, correctness, security and high efficiency as well. In our protocol, only the two participants can deduce the results of comparisons, others include STTP will learn no information. Our protocol can resist various kinds of attacks from both the outside eavesdroppers and the inside participants, even the STTP.
基金Project supported by the National Natural Science Foundation of China(Grant No.62071180)Fundamental Research Funds for the Central Universities,China(Grant No.2020MS099)。
文摘Atmospheric effects have significant influence on the performance of a free-space optical continuous variable quantum key distribution(CVQKD)system.In this paper,we investigate how the transmittance,excess noise and interruption probability caused by atmospheric effects affect the secret-key rate(SKR)of the CVQKD.Three signal wavelengths,two weather conditions,two detection schemes,and two types of attacks are considered in our investigation.An expression aims at calculating the interruption probability is proposed based on the Kolmogorov spectrum model.The results show that a signal using long working wavelength can propagate much further than that of using short wavelength.Moreover,as the wavelength increases,the influence of interruption probability on the SKR becomes more significant,especially within a certain transmission distance.Therefore,interruption probability must be considered for CVQKD by using long-signal wavelengths.Furthermore,different detection schemes used by the receiver will result in different transmission distances when subjected to individual attacks and collective attacks,respectively.
文摘We mostly investigate two schemes. One is to teleport a multi-mode W-type entangled coherent state using a peculiar bipartite entangled state as the quantum channel different from other proposals. Based on our formalism,teleporting multi-mode coherent state or squeezed state is also possible. Another is that the tripartite entangled state is used as the quantum channel of controlled teleportation of an arbitrary and unknown continuous variable in the case of three participators.
文摘A quantum teleportation scheme to teleport a kind of tripartite entangled states of continuous variables by using a quantum channel composed of three bipartite entangled states is proposed. The joint Bell measurement is feasible because the bipartite entangled states are complete and the squeezed state has a natural representation in the entangled state basis. The calculation is greatly simplified by using the Schmidt decomposition of the entangled states.
基金Supported by the National Natural Science Foundation of China under Grant Nos 11504024,61502041,61602045 and 61602046the National Key Research and Development Program of China under Grant No 2016YFA0302600
文摘Measurement-based one-way quantum computation, which uses cluster states as resources, provides an efficient model to perforrn computation. However, few of the continuous variable (CV) quantum algorithms and classical algorithms based on one-way quantum computation were proposed. In this work, we propose a method to implement the classical Hadamard transform algorithm utilizing the CV cluster state. Compared with classical computation, only half operations are required when it is operated in the one-way CV quantum computer. As an example, we present a concrete scheme of four-mode classical Hadamard transform algorithm with a four-partite CV cluster state. This method connects the quantum computer and the classical algorithms, which shows the feasibility of running classical algorithms in a quantum computer efficiently.
基金financial support from the National Natural Science Foundation of China (No. 51675143)
文摘Magnesium(Mg) alloy AZ31 was produced by continuous variable cross-section direct extrusion(CVCDE)to study its deformation behavior. Metallographic microscopy(OM), transmission electron microscopy(TEM), and scanning electron microscopy(SEM) were used to observe the variations in microstructure and fracture morphology of Mg alloy AZ31 as a function of processing methods. The results reveal that grains of Mg alloy AZ31 were refined and their microstructure was homogenized by CVCDE. The recrystallization in Mg alloy AZ31 produced by CVCDE with 2 interim dies was more complete than that produced by conventional extrusion(CE) and CVCDE with 1 interim die, and the grains were finer and more uniform.Plasticity of the AZ31 alloy was improved. Fracture mode was evolved from a combination of ductility and brittleness to a sole ductile form. In summary, a CVCDE mold structure with 2 interim dies can improve microstructure, plasticity, and toughness of Mg alloy AZ31.
基金supported by the Natural Science Research Programme of the Education Department of Anhui Province under Grant No. KJ2009B039Zthe Municipal Level Research Project from Lu'an City directive entrusted to West Anhui University under Grant No. 2008lw004
文摘We propose a deterministic quantum secure direct two check photon sequences are used to check the securities of the communication protocol by using dense coding. The channels between the message sender and the receiver. The continuous variable operations instead of the usual discrete unitary operations are performed on the travel photons so that the security of the present protocol can be enhanced. Therefore some specific attacks such as denial-of-service attack, intercept-measure-resend attack and invisible photon attack can be prevented in ideal quantum channel. In addition, the scheme is still secure in noise channel. Furthurmore, this protocol has the advantage of high capacity and can be realized in the experiment.
基金The project supported by National Natural Science Foundation of China(NSFC)under Grant Nos.60678022 and 10704001the Specialized Research Fund for the Doctoral Program of Higher Education under Grant No.20060357008+2 种基金Natural Science Foundation of Anhui Province under Grant No.070412060the Key Program of the Education Department of Anhui Province under Grant No.2006KJ070Athe Talent Foundation of Anhui University,and Anhui Key Laboratory of Information Materials and Devices(Anhui University)
文摘We propose a scheme for controlled entanglement swapping of continuous variable, where an EPR pair shared by two parties (Alice and Debbie) and a GHZ entangled state shared by three parties (Alice, Bob and Claire) are required. One optical beams of the EPR state will be entangled with the output mode displaced by Bob with the help of Claire. It is shown that the entanglement swapping can occur controlled by the third party (Claire)
基金Project supported by the National Natural Science Foundation of China (Grant No. 11074028)
文摘We investigate continuous variable entanglement produced in two distant coupled cavities, in which two four-level atoms are driven by classical fields respectively. Under the large detuning condition, an effective Hamiltonian containing the square of the creation (annihilation) operator of the cavity field is derived. Due to the nonlinearity, entanglement formally created by the beam splitter type interaction is transformed into the nondegenerate parametric down conversion type. Employing the operator algebraic method, we study the time evolution of the entanglement condition, and show that the system provides us an advantage in achieving a larger photon number with better entanglement. We also discuss the dissipation of the cavities affecting the entanglement.
基金Supported by National Research Foundation and Ministry of Education,Singapore under Research under Grant No.WBS:R-710-000-008-271the Natural Science Foundation of China under Grant No.10975075the Fundamental Research Funds for the Central Universities
文摘We study entanglement swapping in continuous variable systems by using braiding transformations.It isfound that entanglement swapping in two-mode squeezed vacuum states and squeezed coherent states can be realizedbased on the braiding operators.
基金Project supported by the National Natural Science Foundation of China (Grant No 20477043).
文摘We present a realistic scheme for the entanglement swapping of continuous variable, in which a two-mode squeezed vacuum state serves as a quantum channel. The position sum and momentum difference of two local modes are measured. By taking the input entangled state also as a two-mode squeezed vacuum state, we investigate the average fidelity and the yon Neumann entropy of the output state. The results show that the perfect teleportation can be achieved by increasing the squeezing of the quantum channel and that any nonzero squeezing in both the quantum channel and the input entangled state is sufficient to swap the entanglement.
基金supported by the National Natural Science Foundation of China(Grant Nos.12205133,LJKQZ20222315 and 2021BSL013)
文摘Quantum entanglement is a typical nonclassical correlation.Here,we use this concept to analyze quantum entanglement for continuous variables generated by the Schwinger pair production for constant and pulsed electric fields.An initial two-mode entangled state evolves into a three-mode entangled state through a Gaussian channel of the Schwinger effect,which encodes the information about the Schwinger effect.By detecting the entanglement of the output three-mode state,we obtain the optimal parameters for easier to generate particle-antiparticle pairs.We find that the generated 1→2 entanglement is more sensitive to the parameters than the generated 1→1 entanglement.Therefore,we should choose the generated 1→2 entanglement to extract information.We argue that extracting the optimal parameters from quantum entanglement may guide future experiments.
基金Supported by Beijing Natural Science Foundation under Grant Nos.4182006,4162005National Natural Science Foundation of China under Grant Nos.61572053,61472048,61671087,U1636106,61602019,61502016
文摘The difficulty of quantum key agreement is to realize its security and fairness at the same time.This paper presents a new three-party quantum key agreement protocol based on continuous variable single-mode squeezed state.The three parties participating in the agreement are peer entities,making same contributions to the final key.Any one or two participants of the agreement cannot determine the shared key separately.The security analysis shows that the proposed protocol can resist both external and internal attacks.
基金Supported by the National Natural Science Foundation of China under Grant Nos.11574041 and 11375036
文摘In this work, we examine the robust continuous variable quantum correlation by analyzing two coupled optomechanical systems. Under the linearization approximation, the steady state correlation is quantified through correlation function of two non-Hermitian operators and we find that quantum correlation is always existence between two optical fields, two-oscillators and optical field-oscillator. Unlike the discrete variable system, we show quantum correlation in our model seems to be independent without any close transfer relationship. We further emphasize the influence of cavity-cavity coupling parameter on the amount of quantum correlations.
基金Supported by the NSF of China(60174010)Supported by NSF of Hebei Province(102160)Supported by NS of Education Office in Heibei Province(2004123)
文摘This paper is concerned with the oscillation of nonlinear partial difference equations with continuous variables and the corresponding dual equations. Several sufficientconditions are obtained for the oscillation of these equations.